Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc73.bht:"
@article{DBLP:journals/dcc/Adhikari14, author = {Avishek Adhikari}, title = {Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {865--895}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9832-5}, doi = {10.1007/S10623-013-9832-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Adhikari14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AndersonM14, author = {Sarah E. Anderson and Gretchen L. Matthews}, title = {Exponents of polar codes using algebraic geometric code kernels}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {699--717}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9987-8}, doi = {10.1007/S10623-014-9987-8}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AndersonM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BalletR14, author = {St{\'{e}}phane Ballet and Robert Rolland}, title = {On low weight codewords of generalized affine and projective Reed-Muller codes}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {271--297}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9911-7}, doi = {10.1007/S10623-013-9911-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BalletR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ballico14, author = {Edoardo Ballico}, title = {Any network code comes from an algebraic curve taking osculating spaces}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {1023--1026}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9841-4}, doi = {10.1007/S10623-013-9841-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ballico14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlondeauP14, author = {C{\'{e}}line Blondeau and L{\'{e}}o Perrin}, title = {More differentially 6-uniform power functions}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {487--505}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9948-2}, doi = {10.1007/S10623-014-9948-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlondeauP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Broughton14, author = {Wayne Broughton}, title = {Admissible parameters of symmetric designs satisfying {\textdollar}{\textdollar}v=4(k-{\textbackslash}lambda )+2{\textdollar}{\textdollar} and symmetric designs with inner balance}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {77--83}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9810-y}, doi = {10.1007/S10623-013-9810-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Broughton14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BudaghyanHP14, author = {Lilya Budaghyan and Tor Helleseth and Matthew Geoffrey Parker}, title = {Editorial: special issue on coding and cryptography}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {269}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9995-8}, doi = {10.1007/S10623-014-9995-8}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BudaghyanHP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BulyginWB14, author = {Stanislav Bulygin and Michael Walter and Johannes Buchmann}, title = {Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {997--1022}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9840-5}, doi = {10.1007/S10623-013-9840-5}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BulyginWB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CaoH14, author = {Weiwei Cao and Lei Hu}, title = {Projective interpolation of polynomial vectors and improved key recovery attack on {SFLASH}}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {719--730}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9819-2}, doi = {10.1007/S10623-013-9819-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CaoH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletK14, author = {Claude Carlet and Andrew Klapper}, title = {On the arithmetic Walsh coefficients of Boolean functions}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {299--318}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9915-3}, doi = {10.1007/S10623-013-9915-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarletK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Caullery14, author = {Florian Caullery}, title = {A new large class of functions not {APN} infinitely often}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {601--614}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9956-2}, doi = {10.1007/S10623-014-9956-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Caullery14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenLLSW14, author = {Jie Chen and Hoon Wei Lim and San Ling and Le Su and Huaxiong Wang}, title = {Spatial encryption supporting non-monotone access structure}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {731--746}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9823-6}, doi = {10.1007/S10623-013-9823-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenLLSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenLLWW14, author = {Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Hoeteck Wee}, title = {Shorter identity-based encryption via asymmetric pairings}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {911--947}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9834-3}, doi = {10.1007/S10623-013-9834-3}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenLLWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChigiraHK14, author = {Naoki Chigira and Masaaki Harada and Masaaki Kitazume}, title = {On the classification of extremal doubly even self-dual codes with 2-transitive automorphism groups}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {33--35}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9807-6}, doi = {10.1007/S10623-013-9807-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChigiraHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CossidenteP14, author = {Antonio Cossidente and Francesco Pavese}, title = {New infinite families of hyperovals on {\textdollar}{\textdollar}{\textbackslash}mathcal {H} (3, q2), q{\textdollar}{\textdollar} {H} {(} 3 , q 2 {)} , q odd}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {217--222}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9818-3}, doi = {10.1007/S10623-013-9818-3}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CossidenteP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CouvreurGGOT14, author = {Alain Couvreur and Philippe Gaborit and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Ayoub Otmani and Jean{-}Pierre Tillich}, title = {Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {641--666}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9967-z}, doi = {10.1007/S10623-014-9967-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CouvreurGGOT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DoughertyS14, author = {Steven T. Dougherty and Eseng{\"{u}}l Salt{\"{u}}rk}, title = {Counting codes over rings}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {151--165}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9815-6}, doi = {10.1007/S10623-013-9815-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DoughertyS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Dubrova14, author = {Elena Dubrova}, title = {Generation of full cycles by a composition of NLFSRs}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {469--486}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9947-3}, doi = {10.1007/S10623-014-9947-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Dubrova14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FangC14, author = {Jianying Fang and Yanxun Chang}, title = {Mutually disjoint t-designs and t-SEEDs from extremal doubly-even self-dual codes}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {769--780}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9825-4}, doi = {10.1007/S10623-013-9825-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FangC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FangZC14, author = {Jianying Fang and Junling Zhou and Yanxun Chang}, title = {Nonexistence of some quantum jump codes with specified parameters}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {223--235}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9814-7}, doi = {10.1007/S10623-013-9814-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FangZC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FengHLG14, author = {Tao Feng and Sihuang Hu and Shuxing Li and Gennian Ge}, title = {Difference sets with few character values}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {825--839}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9830-7}, doi = {10.1007/S10623-013-9830-7}, timestamp = {Tue, 22 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FengHLG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Fontein0W14, author = {Felix Fontein and Michael Schneider and Urs Wagner}, title = {PotLLL: a polynomial time version of {LLL} with deep insertions}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {355--368}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9918-8}, doi = {10.1007/S10623-014-9918-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Fontein0W14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GavrilyukM14, author = {Alexander L. Gavrilyuk and Ivan Yu. Mogilnykh}, title = {Cameron-Liebler line classes in PG(n, 4)}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {969--982}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9838-z}, doi = {10.1007/S10623-013-9838-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GavrilyukM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Geil14, author = {Olav Geil}, title = {Erratum to: On the second weight of generalized Reed-Muller codes}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {267}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9966-0}, doi = {10.1007/S10623-014-9966-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Geil14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GrozaW14, author = {Bogdan Groza and Bogdan Warinschi}, title = {Cryptographic puzzles and DoS resilience, revisited}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {177--207}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9816-5}, doi = {10.1007/S10623-013-9816-5}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/GrozaW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HerranzRS14a, author = {Javier Herranz and Alexandre Ruiz and Germ{\'{a}}n S{\'{a}}ez}, title = {New results and applications for multi-secret sharing schemes}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {841--864}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9831-6}, doi = {10.1007/S10623-013-9831-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HerranzRS14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HoriguchiMN14a, author = {Naoyuki Horiguchi and Tsuyoshi Miezaki and Hiroyuki Nakasora}, title = {Erratum to: On the support designs of extremal binary doubly even self-dual codes}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {1027--1028}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9990-0}, doi = {10.1007/S10623-014-9990-0}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HoriguchiMN14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuangL14, author = {Jialin Huang and Xuejia Lai}, title = {Revisiting key schedule's diffusion in relation with round function's diffusion}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {85--103}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9804-9}, doi = {10.1007/S10623-013-9804-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuangL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JhanwarVS14, author = {Mahabir Prasad Jhanwar and Ayineedi Venkateswarlu and Reihaneh Safavi{-}Naini}, title = {Paillier-based publicly verifiable (non-interactive) secret sharing}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {529--546}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9952-6}, doi = {10.1007/S10623-014-9952-6}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/JhanwarVS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KimT14, author = {Hyun Kwang Kim and Phan Thanh Toan}, title = {New inequalities for {\textdollar}{\textdollar}q{\textdollar}{\textdollar} q -ary constant-weight codes}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {369--381}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9924-x}, doi = {10.1007/S10623-014-9924-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KimT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KloveS14, author = {Torleiv Kl{\o}ve and Moshe Schwartz}, title = {Linear covering codes and error-correcting codes for limited-magnitude errors}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {329--354}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9917-1}, doi = {10.1007/S10623-013-9917-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KloveS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KloveS14a, author = {Torleiv Kl{\o}ve and Moshe Schwartz}, title = {Erratum to: Linear covering codes and error-correcting codes for limited-magnitude errors}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {1029}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9991-z}, doi = {10.1007/S10623-014-9991-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KloveS14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KositwattanarerkO14, author = {Wittawat Kositwattanarerk and Fr{\'{e}}d{\'{e}}rique E. Oggier}, title = {Connections between Construction {D} and related constructions of lattices}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {441--455}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9939-3}, doi = {10.1007/S10623-014-9939-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KositwattanarerkO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LandjevV14, author = {Ivan N. Landjev and Peter Vandendriessche}, title = {On the rank of incidence matrices in projective Hjelmslev spaces}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {615--623}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9959-z}, doi = {10.1007/S10623-014-9959-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LandjevV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiSS14, author = {Wenhui Li and Vladimir Sidorenko and Danilo Silva}, title = {On transform-domain error and erasure correction by Gabidulin codes}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {571--586}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9954-4}, doi = {10.1007/S10623-014-9954-4}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiTH14, author = {Nian Li and Xiaohu Tang and Tor Helleseth}, title = {New {\textdollar}{\textdollar}M{\textdollar}{\textdollar} {M} -ary sequences with low autocorrelation from interleaved technique}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {237--249}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9821-8}, doi = {10.1007/S10623-013-9821-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiTH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiangLD14, author = {Miao Liang and Mingchao Li and Beiliang Du}, title = {A construction for t-fold perfect authentication codes with arbitration}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {781--790}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9826-3}, doi = {10.1007/S10623-013-9826-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiangLD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LieblerP14, author = {Robert A. Liebler and Cheryl E. Praeger}, title = {Neighbour-transitive codes in Johnson graphs}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {1--25}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9982-0}, doi = {10.1007/S10623-014-9982-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LieblerP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LinJ14, author = {Yiling Lin and Masakazu Jimbo}, title = {Extremal properties of t-SEEDs and recursive constructions}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {805--823}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9829-0}, doi = {10.1007/S10623-013-9829-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LinJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LisonekL14, author = {Petr Lisonek and Hui Yi Lu}, title = {Bent functions on partial spreads}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {209--216}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9820-9}, doi = {10.1007/S10623-013-9820-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LisonekL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LisonekS14, author = {Petr Lisonek and Vijaykumar Singh}, title = {Quantum codes from nearly self-orthogonal quaternary linear codes}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {417--424}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9934-8}, doi = {10.1007/S10623-014-9934-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LisonekS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Liu14, author = {Huaning Liu}, title = {A family of elliptic curve pseudorandom binary sequences}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {251--265}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9822-7}, doi = {10.1007/S10623-013-9822-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Liu14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuL14, author = {Xiaogang Liu and Yuan Luo}, title = {The weight distributions of some cyclic codes with three or four nonzeros over {\(\mathbb{F}\)}\({}_{\mbox{3}}\)}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {747--768}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9824-5}, doi = {10.1007/S10623-013-9824-5}, timestamp = {Tue, 25 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuPH14, author = {Xing Liu and Daiyuan Peng and Hongyu Han}, title = {Low-hit-zone frequency hopping sequence sets with optimal partial Hamming correlation properties}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {167--176}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9817-4}, doi = {10.1007/S10623-013-9817-4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LiuPH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LondahlJ14, author = {Carl L{\"{o}}ndahl and Thomas Johansson}, title = {Improved algorithms for finding low-weight polynomial multiples in F\({}_{\mbox{2}}\)[x] and some cryptographic applications}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {625--640}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9960-6}, doi = {10.1007/S10623-014-9960-6}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LondahlJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LuF14, author = {Hui{-}Chuan Lu and Hung{-}Lin Fu}, title = {The exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structures}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {37--46}, year = {2014}, url = {https://doi.org/10.1007/s10623-012-9792-1}, doi = {10.1007/S10623-012-9792-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LuF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MaZS14, author = {Wenping Ma and Chun'e Zhao and Dongsu Shen}, title = {New optimal constructions of conflict-avoiding codes of odd length and weight 3}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {791--804}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9827-2}, doi = {10.1007/S10623-013-9827-2}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/MaZS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Mennink14, author = {Bart Mennink}, title = {On the collision and preimage security of {MDC-4} in the ideal cipher model}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {121--150}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9813-8}, doi = {10.1007/S10623-013-9813-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Mennink14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MomiharaY14, author = {Koji Momihara and Mieko Yamada}, title = {Divisible difference families from Galois rings GR(4, n) and Hadamard matrices}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {897--909}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9833-4}, doi = {10.1007/S10623-013-9833-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MomiharaY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Nakashima14, author = {Tohru Nakashima}, title = {Construction of codes from Arakelov geometry}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {47--54}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9809-4}, doi = {10.1007/S10623-013-9809-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Nakashima14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/NielsenZ14, author = {Johan Sebastian Rosenkilde Nielsen and Alexander Zeh}, title = {Multi-trial Guruswami-Sudan decoding for generalised Reed-Solomon codes}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {507--527}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9951-7}, doi = {10.1007/S10623-014-9951-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/NielsenZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/OngO14, author = {Soon Sheng Ong and Fr{\'{e}}d{\'{e}}rique E. Oggier}, title = {Wiretap lattice codes from number fields with no small norm elements}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {425--440}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9935-7}, doi = {10.1007/S10623-014-9935-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/OngO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/OzbudakS14, author = {Ferruh {\"{O}}zbudak and Z{\"{u}}lf{\"{u}}kar Saygi}, title = {On the exact number of solutions of certain linearized equations}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {457--468}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9942-8}, doi = {10.1007/S10623-014-9942-8}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/OzbudakS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PirsicW14, author = {Gottlieb Isabel Pirsic and Arne Winterhof}, title = {On discrete Fourier transform, ambiguity, and Hamming-autocorrelation of pseudorandom sequences}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {319--328}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9916-2}, doi = {10.1007/S10623-013-9916-2}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PirsicW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/RaaphorstMS14, author = {Sebastian Raaphorst and Lucia Moura and Brett Stevens}, title = {A construction for strength-3 covering arrays from linear feedback shift register sequences}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {949--968}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9835-2}, doi = {10.1007/S10623-013-9835-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/RaaphorstMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/RosenthalST14, author = {Joachim Rosenthal and Natalia Silberstein and Anna{-}Lena Trautmann}, title = {On the geometry of balls in the Grassmannian and list decoding of lifted Gabidulin codes}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {393--416}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9932-x}, doi = {10.1007/S10623-014-9932-X}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/RosenthalST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Sarkar14, author = {Santanu Sarkar}, title = {Small secret exponent attack on {RSA} variant with modulus N=p\({}^{\mbox{r}}\)q}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {383--392}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9928-6}, doi = {10.1007/S10623-014-9928-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Sarkar14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SchmidtT14, author = {Bernhard Schmidt and Ming Ming Tan}, title = {Construction of relative difference sets and Hadamard groups}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {105--119}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9811-x}, doi = {10.1007/S10623-013-9811-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SchmidtT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShibutaniB14, author = {Kyoji Shibutani and Andrey Bogdanov}, title = {Towards the optimality of Feistel ciphers with substitution-permutation functions}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {667--682}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9970-4}, doi = {10.1007/S10623-014-9970-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShibutaniB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SoleimanyN14, author = {Hadi Soleimany and Kaisa Nyberg}, title = {Zero-correlation linear cryptanalysis of reduced-round LBlock}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {683--698}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9976-y}, doi = {10.1007/S10623-014-9976-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SoleimanyN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Stichtenoth14, author = {Henning Stichtenoth}, title = {A note on composed products of polynomials over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {27--32}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9808-5}, doi = {10.1007/S10623-013-9808-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Stichtenoth14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Wachter-ZehZ14, author = {Antonia Wachter{-}Zeh and Alexander Zeh}, title = {List and unique error-erasure decoding of interleaved Gabidulin codes with interpolation techniques}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {547--570}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9953-5}, doi = {10.1007/S10623-014-9953-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Wachter-ZehZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YankovL14, author = {Nikolay I. Yankov and Moon Ho Lee}, title = {New binary self-dual codes of lengths 50-60}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {983--996}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9839-y}, doi = {10.1007/S10623-013-9839-Y}, timestamp = {Mon, 30 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YankovL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YuWL14, author = {Yuyin Yu and Mingsheng Wang and Yongqiang Li}, title = {A matrix approach for constructing quadratic {APN} functions}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {2}, pages = {587--600}, year = {2014}, url = {https://doi.org/10.1007/s10623-014-9955-3}, doi = {10.1007/S10623-014-9955-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YuWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhouL14, author = {Jianqin Zhou and Wanquan Liu}, title = {The {\textdollar}{\textdollar}k{\textdollar}{\textdollar} -error linear complexity distribution for {\textdollar}{\textdollar}2n{\textdollar}{\textdollar} -periodic binary sequences}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {55--75}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9805-8}, doi = {10.1007/S10623-013-9805-8}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhouL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.